Telegram Web Link
bootg.com
»
United States
»
Information Security
» Telegram Web
Information Security
https://rhinosecuritylabs.com/research/microweber-database-disclosure/
Rhino Security Labs
CVE-2020-13405: MicroWeber Unauthenticated User Database Disclosure - Rhino Security Labs
This blog describes how a vulnerability was identified in MicroWeber, an open-source Content Management System (CMS) written in PHP
Information Security
https://www.elttam.com/blog/lua-suid-shells/
Elttam
Lua SUID Shells
elttam is an independent security company providing research-driven security assessment services. We combine pragmatism and deep technical insight to help our customers secure their most important assets.
Information Security
https://www.hackingarticles.in/comprehensive-guide-on-path-traversal/
Hacking Articles
Comprehensive Guide on Path Traversal - Hacking Articles
In our previous post, we’ve explained the Local File Inclusion attack in detail, which you can read from here. I recommend, then, to revisit our
Information Security
https://github.com/hahwul/hack-pet
GitHub
GitHub - hahwul/hack-pet:
🐰
Managing command snippets for hackers/bug bounty hunters. with pet.
🐰
Managing command snippets for hackers/bug bounty hunters. with pet. - hahwul/hack-pet
Information Security
https://github.com/nomi-sec/PoC-in-GitHub
GitHub
GitHub - nomi-sec/PoC-in-GitHub:
📡
PoC auto collect from GitHub.
⚠️
Be careful Malware.
📡
PoC auto collect from GitHub.
⚠️
Be careful Malware. - nomi-sec/PoC-in-GitHub
Information Security
https://github.com/knqyf263/pet
GitHub
GitHub - knqyf263/pet: Simple command-line snippet manager
Simple command-line snippet manager. Contribute to knqyf263/pet development by creating an account on GitHub.
Information Security
https://www.nds.ruhr-uni-bochum.de/media/hfs/attachments/files/2010/03/hackpra09_fu_esser_php_exploits1.pdf
Information Security
https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html
s1gnalcha0s.github.io
Stored XSS, and SSRF in Google using the Dataset Publishing Language
“Those who rule data will rule the entire world.” - 孫正義
Information Security
https://github.com/hlldz/dazzleUP
GitHub
GitHub - hlldz/dazzleUP: A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates…
A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. - hlldz/dazzleUP
Information Security
https://github.com/duc-nt/CVE-2020-6287-exploit
GitHub
GitHub - duc-nt/CVE-2020-6287-exploit: PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission…
PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https://github.com/rapid7/metas...
Information Security
https://github.com/ra1nb0rn/avain
GitHub
GitHub - ra1nb0rn/avain: A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks - GitHub - ra1nb0rn/avain: A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Information Security
https://github.com/hardenedlinux/harbian-qa/blob/master/syzkaller/kstate_resource.md
GitHub
hardenedlinux/harbian-qa
Bug hunting through fuzzer/*-sanitizer/etc... Contribute to hardenedlinux/harbian-qa development by creating an account on GitHub.
Information Security
https://twitter.com/citronneur/status/1286314161102872577
Twitter
Sylvain Peyrefitte
Capture NamedPipe traffic using #Wireshark #ETW and the fabulous file sytem filter driver from @kobyk ! #Windows #Internal github.com/airbus-cert/Wi…
Information Security
https://twitter.com/aboul3la/status/1286012324722155525
Twitter
Ahmed Aboul-Ela
Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower. For example to read "/+CSCOE+/portal_inc.lua" file. https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../…
Information Security
https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91.pdf
Information Security
https://seanmelia.files.wordpress.com/2016/01/out-of-band-xml-external-entity-injection-via-saml-redacted.pdf
Information Security
https://www.anitian.com/owning-saml/
Anitian
Owning SAML
SAML Pentest and Implementaion demonstrates how insecure configurations combine to form a phishing attack that can give attackers access.
Information Security
https://www.a12d404.net/windows/2019/10/30/schedsvc-persist-without-task.html
www.a12d404.net
Persistence using Task Scheduler without a Scheduled Task
Task Scheduler service loads a non-existing DLL enabling persistence as `NT AUTHORITY\SYSTEM`.
Information Security
https://github.com/wintrmvte/Citadel
GitHub
GitHub - redcode-labs/Citadel: Collection of pentesting scripts
Collection of pentesting scripts. Contribute to redcode-labs/Citadel development by creating an account on GitHub.
Information Security
https://shells.systems/in-memory-shellcode-decoding-to-evade-avs/
Shells.Systems
In-Memory shellcode decoding to evade AVs/EDRs - Shells.Systems
Estimated Reading Time: 9 minutes During the previous week, I was doing some research about win32 APIs and how we can use them during weaponizing our attack, I already did some work related to process injection in the past, but I was looking for something…
2024/11/20 08:43:38
Back to Top
HTML Embed Code:
TW
HK
DE
US
CA
RU
NO
CN
UA
SG
YE
IN
SA
FR
IQ
UK
EG